SlideShare a Scribd company logo
1 of 10
Download to read offline
Graduate Course Development in Biometrics

                          Dr. Stephen J. Elliott, Dr. Mathias J. Sutton
                             Department of Industrial Technology
                                    School of Technology
                                   West Lafayette, IN, 47906




Abstract

This paper accounts the development of a graduate course in biometrics at Purdue University.
The course has been developed in conjunction with the inauguration of an applied biometrics
research laboratory. The laboratory represents a Purdue-industry partnership through sponsored
projects, advisory relationships, and financial support, industry partners assure that the laboratory
achieves its potential in preparing students to perform effectively in the quickly evolving
biometrics environment. The laboratory also serves as an educational resource for industry.

Introduction

TECH 581S Biometric Technology and Applications, is a class intended for upper-level
undergraduates in a number of disciplines, including aviation technology, industrial technology,
computer information systems technology, and management, as well as graduate students in
technology. The course is limited to 20 students per semester for two primary reasons: first to
enable a small number of undergraduate students to interact with graduate students who perform
a mentoring role in research. Secondly, the development of small research teams allows several
projects to be completed and gives the students a tangible research experience to accompany the
lectures that span the various biometric technologies.

A number of factors have driven the demand for the course: an expansion of current classes, an
increase in the awareness of biometric technologies in multiple applications, and the demand
from students, especially post 9/11, to learn more about biometric technologies.

The purpose of the course is to examine biometric technologies from the viewpoint of systems
integrator, purchaser, and evaluator. Success of the biometrics system is important; therefore, this
course examines the fundamentals of testing and evaluation, writing technical reports, presenting
research, understanding the process of establishing biometrics standards, and understanding the
individual technologies.

The course is consistent with the mission of the School of Technology and the Department of
Industrial Technology to “assess the existing curricula and programs; develop new
curricula/programs to make them relevant to the life and careers of students, attractive in terms
of content, and connected to the needs of business and industry.”



                              Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                      Copyright  2002, American Society for Engineering Education
Prerequisite Courses

TECH 581S has no prerequisites, as it is intended to attract students from a number of disciplines
into the biometrics arena, as these technologies themselves enter different applied environments.
However, a number of undergraduate students that are participating in the first run of the course
have had prior experience in biometric technologies in IT 345 Automatic Identification and Data
Capture.

Course Description

The course is a three-hour, three-credit course that meets once a week for 16 weeks with an
independent lab research component. The research activities are a major component of the class.
As such research activities make up 50% of the course grade. Upon successful completion of the
course, each student will be able to:

       a)      Classify biometric applications.
       b)      Identify techniques for testing biometric devices.
       c)      Apply “best practice” techniques for biometric project management and
               implementation.
       d)      Understand which biometrics technology is best for a given application.
       e)      Understand the ethics of biometric technologies.
       f)      Understand the fundamentals of fingerprinting, iris scanning, speaker verification,
               hand geometry, dynamic signature recognition, facial recognition, and multi
               biometrics – voice, lip and facial recognition.
       e)      Understand the limitations of biometric technologies.

Semester activities are divided into nine different sessions (see Table 1), which follow the main
lecture topics. A few of the sessions span more than one week.

       Table 1 Session Schedule for TECH 581S

        Session                     Lecture Topic
           1       Course Introduction and Pre-Test
           2       Biometrics - An Introduction
           3       Biometric Testing and Evaluation
           4       Dynamic Signature Verification
           5       Hand Geometry
           6       Fingerprint
           7       Facial, Iris and Retinal Identification
           8       Voice Recognition
           9       Biometric Applications and Implementation




                              Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                      Copyright  2002, American Society for Engineering Education
Research Activities

The purpose of the research activities is to provide students with an applied research experience
that they can use in their specific disciplines. Overall, there are 13 different research projects,
which include fake finger testing, testing and evaluating fingerprint sensors on mobile
computers, impostor knowledge within dynamic signature verification, and replication of a voice
telematics experiment. However, most of the research activities are focused in two main areas:
digital fingerprint and dynamic signature technology.

The digital fingerprint thrust evolved based on discussions in the biometric community listserv
on the “gummy finger” debate [1]. This debate provided course developers with a unique
opportunity to create a cross-disciplinary project team comprised researchers from the Schools of
Management, Computer Science, and Technology to examine the research and to expand the
body of knowledge in this topic. Furthermore, attacks (such as fake fingers on biometric
sensors) discussed in the literature, enable students to examine research protocols, replicate the
tests, and report those findings within a constrained 16-week semester. The research will
provide vendors and industry partners with feedback on the performance of their sensors, given
the attacks described. Initially, research activities will center on two biometric technologies –
fingerprint and dynamic signature verification. There has been little work published on
fingerprint sensor attacks. According to Matsumoto, Matsumoto, Yamada, and Hoshino [1],
"security evaluation against attacks using such artificial fingers has rarely been disclosed."

The second research focus is a continuation of work already started in dynamic signature
verification technology. Within the realm of dynamic signature verification, forgery is discussed
at length [2-19], but with conflicting definitions of a forgery.

Laboratory Equipment

Equipment donations to the laboratory, software, and hardware upgrades have provided the
opportunity to offer a course in biometric technologies. This equipment includes a number of
fingerprint sensors that use both pattern and minutiae based algorithms; a desktop iris
recognition camera; several dynamic signature verification digitizers, and a hand geometry
reader.

Session Outline

As noted earlier, the course is divided into nine distinct sessions, designed to group a number of
lectures together within a particular topic.

Session One – Course Introduction

The first session introduces and outlines the course. A 100-item pre-test assesses students’
current knowledge across biometric technologies and their perceptions of the technology. At the
completion of each session, a post-test will evaluate their knowledge on each specific technology
and provide both student and instructor with useful information on the success of the instruction,
as well as gaps in student knowledge. The first session also includes an on-line evaluation


                              Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                      Copyright  2002, American Society for Engineering Education
component, where each student completes the National Institute of Health human subject
tutorial. Each student will participate as subjects in fellow students’ research and as such must
understand the requirements of the Purdue University Human Subjects Review Board.

Session Two – Introduction to Biometrics

The second session outlines biometric technologies and introduces students to biometric
technologies. Students will learn common research methodologies, the classification of biometric
technologies [20] and the fundamentals of biometric technology [21]. Also included in this session is a
discussion of testing protocols for dynamic signature verification [22].

Session Three – Biometric Testing and Evaluation

Session 3 discusses biometrics from a historical perspective [23]. This session also includes readings
and discussion on testing and evaluation, based on the UK Best Practice Testing Document and
biometric applications and taxonomy [24-25]. A discussion on the testing methodologies relating to
each group’s project will be started. Students will arrive with a draft of their testing protocol. This
session will have approximately two hours of lecture and one hour of testing protocol evaluation.
After session 3, all the groups should have finalized their testing protocol for the research
experiments. As the UK Biometric Best Practice document is central to the research protocol
development, students will be expected to have a comprehensive understanding of the manuscript;
which will be evaluated using an online test. To help students understand the UK Biometric Best
Practice Document, they will critique the testing methodology related to a case study [3]. In
preparation for the next session, the students will read the National Biometric Test Center Collected
Works, specifically those sections related to testing and evaluation [21, 26-28]. As with all testing,
discussion on imposters (important to understand in the context of the research being conducted in
the class) centers on allowing good imposters to test [29].

Session Four – Dynamic Signature Verification

The fourth session continues to discuss the role of the readings related to biometrics testing and
evaluation [30].

The course shifts in this session to focus on specific technologies and their role in industry. The
first experiment involves dynamic signature verification as it relates to the feedback from the
digitizer. The following research question is posed: is there a statistical difference in the individual
variables across visible and non-visible feedback devices? Several devices will be studied,
including those that have ink visible, against those devices that do not have ink visible (but both use
a stylus), compared with a digitizer that uses pen and paper. A comparison of the underlying
dynamic traits of the signature across all of these digitizers will be studied. Another dynamic
signature verification study will examine the differences between gender and handedness across
devices.




                               Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                       Copyright  2002, American Society for Engineering Education
Session Five – Hand Geometry

The lecture component of session five describes hand geometry and common applications such
as immigration and access control systems. The research component of this session continues
with a discussion on dynamic signature verification. The research focus in this session is to
understand how the variables of the dynamic signature change when an impostor knows
progressively more information about the genuine signature. A genuine signature is defined as a
good faith attempt by a user to match his/her own stored template. An “imposter” transaction is
a “zero-effort” attempt by a person unknown to the system to match a stored template. An
imposter attempt is classed as “zero-effort” if the individual submits his/her own biometric
feature as if attempting successful verification against his/her own template. The best practice
document [30] acknowledges that with dynamic signature verification, an imposter would sign
his/her own signature in a zero-effort attempt. Dynamic signature verification testing also poses
additional problems, notwithstanding “zero-effort” attempts. Some dynamic signature
verification studies use several methods to determine imposter distributions by forging a
signature. Different levels of forgery exist, done by different individuals, with varying
knowledge about the signature and under differing conditions, incentives, etc. Mettyear suggests
that there are levels of information that the signer might have in order to make an attempt at a
forgery.


Session Six - Fingerprint

Both the research and lecture components of this session deal with fingerprints and the concept of
fingerprint identification. Several articles will be used to explain the concept of fingerprint
identification. Aspects to be included in this session include fingerprint standards and
methodologies and latent imaging [31-39]. The research focus of this session is to enroll users using
the fingerprint devices selected for the studies on fake or artificial fingers. The second part of the
fingerprint technology session will be to complete the research on fingerprinting and spoofing.
Each semester the research objectives will change, depending on previous research, available
grants, and resources. For the first run of the class, the fingerprint studies will examine spoofing
the biometric device. There are several attacks that can be presented to a device [1]. These are
using the registered finger under duress, using an impostor's finger (commonly called a zero-
effort forgery), using a severed finger (liveness), a genetic clone of the finger, and using an
artificial clone of the registered finger. The study will concentrate on the artificial clone of the
registered finger. Several methodologies will be used to create an artificial clone of the
registered finger, as established in prior research, as well as various accounts in the trade
press[1,18-19].

Session Seven – Facial, Iris and Retinal Identification

This session will describe the uses of facial recognition. Readings include discussions on facial
recognition as they relate to applications [40--46]. There will also be a discussion on the facial
recognition and testing [47], and the Facial Recognition Technology Test (FERET). Iris and retinal
identification are also discussed in this session. As many enrolled students are in aviation
technology, several of the application readings are from online discussions posted as a result of


                               Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                       Copyright  2002, American Society for Engineering Education
September 11th, 2001 terrorist attacks [48-55]. Research components in this session relate to the
continued evaluation of the fingerprint sensors as discussed earlier.

Session Eight – Voice Recognition

Although the majority of the course has centered on the identification of an individual, this
session builds on a previous Masters degree directed project describing a telematics user
interface [56]. A practical laboratory activity will be set up utilizing a limited command set for a
touch sensitive entertainment system. The difference in time between voice and non-voice are
measured.

Session Nine - Biometric Applications and Implementations

The final session outlines biometric technologies and some of the pitfalls and criticisms of
biometrics with regard to the media. A debate will be initiated in response to criticisms of how
the technologies are used, within the context of [75-81]. In this session, other readings will be
discussed including biometrics and privacy [82-88]. Finally, a discussion on what biometric is
suitable for a specific application will be revisited [89]. At the conclusion of this session, students
will receive a post-test evaluating their performance over the semester.

Conclusion

This paper was written to provide information to the reader on the development of a biometrics
course for upper-level undergraduate and graduate students. The paper outlined information on
the readings that are used in the class as well as the research activities that are proposed for the
students. Further papers will be written to provide educators with lessons learned in the
developments of the course and its research.



                                                      Bibliography


[1]     T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, "Impact of Artificial Gummy Fingers on
        Fingerprint Systems," Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence
        Techniques IV, 2002.

[2]     H. Dullink, van Daalen, B., Nijhuis, J., Spaanenburg, L., & Zuidhof, H., "Implementing a DSP Kernel for
        Online Dynamic Handwritten Signature Verification Using the TMS320DSP Family," EFRIE, France
        SPRA304, 1996.

[3]     S. J. Elliott, "A Comparison of On-Line Dynamic Signature Trait Variables vis-à-vis Mobile Computing
        Devices and Table-Based Digitizers," presented at Automatic Identification Advanced Technologies (Auto
        ID 2002), New York, 2002.

[4]     F. D. Greiss, "On-Line Signature Verification." Michigan State University, East Lansing, MI May, 2000.

[5]     D. J. Hamilton, Whelan, J., McLaren, A., & MacIntyre, I., "Low Cost Dynamic Signature Verification
        System.," presented at European Convention on Security and Detention, London, United Kingdom, 1995.


                                Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                        Copyright  2002, American Society for Engineering Education
[6]    J. P. Holmes, "A Performance Evaluation of Biometric Identification Devices," Sandia National Laboratory
       SANDIA91-0276, 1991.

[7]    Y. Komiya, Matsumoto, T., "On-line Pen Input Signature Verification PPI (Pen-Position / Pen-Pressure /
       Pen-Inclination)," IEEE, 1999.

[8]    F. Leclerc, Plamondon, R., "Automatic Signature Verification: The State of the Art - 1989-1993," in
       Progress in Automatic Signature Verification. Singapore: World Scientific Publishing Company, 1994, pp.
       3-21.

[9]    L. Lee, Berger, T., "Reliable Online Human Signature Verification System for Point-of-Sales
       Applications," Proceedings of the 12th IAPR International Conference on Computer Vision and Image
       Processing, Conference B, vol. 2, pp. 19-32, 1994.

[10]   X. Li, Parizeau, M., Plamondon, R, "Segmentation and Reconstruction of On-Line Handwritten Script.,"
       IEEE Pattern Recognition, pp. 675-684, 1998.

[11]   R. Martens, Claesen, L, "On-Line Signature Verification: Discrimination Emphasized," IEEE, 1997.

[12]   M. Mingming, Wijesoma, W, "Automatic On-Line Signature Verification Based on Multiple Models,"
       presented at CIFEr'01: Computational Intelligence in Financial Engineering Conference, 2000.

[13]   N. Mohankrishnan, Lee, W.S., Paulik, M., "Improved Segmentation through Dynamic Time Warping For
       Signature Verification using a Neural Network Classifier," presented at Signal Processing Society
       International Conference on Image Processing, 1998.

[14]   R. Plamondon, "The Design of an On-Line Signature Verification System: From Theory to Practice," in
       Progress in Automatic Signature Verification. New York: World Scientific Publishing Company, 1994.

[15]   C. Schmidt, & Kraiss, K. F, "Establishment of Personalized Templates for Automatic Signature
       Verification," IEEE, pp. 263-267, 1997.

[16]   Q. Z. Wu, Jou, I. C., & Lee, S. Y, "On-Line Signature Verification using LPC Cepstrum and Neural
       Networks," IEEE Transactions on Systems, Man, and Cybernetics, pp. 148-153, 1997.

[17]   Y. Yamazaki, Mizutani, Y., & Komatsu, N., "Extraction of Personal Features from Stroke Shape, Writing
       Pressure and Pen Inclination in Ordinary Characters.," presented at Fifth International Conference on
       Document Analysis and Recognition, 1998.

[18]   Tekey, "Trick an Optical Sensor," vol. 2002: Tekey Group, 2002.

[19]   T. van der Putte, Keuning, J, "Biometric Fingerprint Recognition: Don’t Get Your Fingers Burned,"
       presented at IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced
       Applications, 2000.

[20]   P. Philips, Martin, A., Wilson, C., Przybocki, M., "An Introduction to Evaluating Biometric Systems," in
       IEEE Computer, 2000, pp. 56-63.

[21]   J. L. Wayman, "Fundamentals of Biometric Authentication Technologies," in National Biometric Test
       Center Collected Works, vol. 1, J. L. Wayman, Ed. San Jose, CA: National Biometric Test Center, 1999.

[22]   S. J. Elliott, "Development of a Biometric Testing Protocol for Dynamic Signature Verification," presented
       at ICARCV, 2002, Singapore, 2002.

[23]   J. Ashborne, Biometrics: Advanced Identity Verification. New York: Springer-Verlag, 2000.


                                Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                        Copyright  2002, American Society for Engineering Education
[24]   N. Mansfield, Wayman, J. L., "U.K. Biometric Working Group Best Practice Document," National
       Physical Laboratory, Teddington, England February 12 2002.

[25]   S. J. Elliott, "Addendum to the U. K. Biometric Best Practice Document," Purdue University, West
       Lafayette, IN August 10 2001.

[26]   J. L. Wayman, "The Functions of Biometric Identification Devices," vol. 2000. San Jose, CA: National
       Biometric Test Center, 2000.

[27]   J. L. Wayman, "Technical Testing and Evaluation of Biometric Identification Devices," in National
       Biometric Test Center Collected Works, vol. 1, J. L. Wayman, Ed. San Jose, CA: National Biometric Test
       Center, 2000, pp. 65-87.

[28]   J. L. Wayman, "Confidence Interval and Test Size Estimation for Biometric Data," presented at Automatic
       Identification Advanced Technologies (Auto ID 1999), Summit, NJ, 1999.

[29]   J. M. Colombi, Reider, J. S., Cambell, J. P., "Allowing Good Imposters to Test," Conference Record of the
       Thirty-First Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 296-300, 1997.

[30]   N. Mansfield, "A Review of Test Protocol for Scenario Evaluation of SMARTpen." Teddington, United
       Kingdom, 2000.

[31]   A. Jain, Bolle, R., & Pankanti, S., Biometrics: Personal Identification in Networked Society. Norwell, MA:
       Klewer Academic Publishers Group, 2001.

[32]   The Science of Fingerprints. Classifications and Uses, Rev 12-84 Ed: United States Department of Justice,
       Federal Bureau of Investigation, 1984.

[33]   A. Jain, Hong, L., & Bolle, R., "On-line Fingerprint Verification," IEEE Transactions on Pattern Analysis
       and Machine Intelligence, vol. 19, pp. 302-314, 1997.

[34]   A. K. Jain, Prabhakaran, S., Hong, L., Pankanti, S., "Filterbank-based Fingerprint Matching," IEEE
       Transactions on Image Processing, vol. 9, pp. 846-859, 2000.

[35]   J. K. Schneider, Gojevic. S. M.,, "Ultrasonic Imaging Systems for Personal Identification," IEEE 2001
       Ultrasonics Symposium, vol. 1, pp. 595-601, 2001.

[36]   M. Jiangto, Shaojun, W, "Automatic Fingerprint Identification System for Small Sized Database," Proc.
       4th International Conference on ASIC, 2001, pp. 386-389, 2001.

[37]   D. Maio, Maltoni, D., Cappelli, R., Wayman, J. L., Jain, A. K, "FCV2000: Fingerprint Verification
       Competition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, pp. 402-412,
       2002.

[38]   A. K. Jain, Ross, A., Prabhakaran, S, "Fingerprint Matching Using Minutiae and Texture Features,"
       presented at Proc International Conference on Image Processing (ICIP), Greece, 2001.

[39]   U. Halici, Jain, L. C., Erol, A., "Introduction to Fingerprinting," in Intelligent Biometric Techniques in
       Fingerprint and Face Recognition, L. C. Jain, Halici, U. Hayashi, I., Lee, S. B., Tsutsui, S., Ed. Boca
       Raton, FL: CRC Press, 1999, pp. 1-35.

[40]   ACLU, "ACLU Opposes Use of Face Recognition Software in Airports Due To Ineffectiveness and
       Privacy Concerns," vol. 2002: ACLU.

[41]   P. E. Agre, "Your Face is not a Bar Code: Arguments against Automatic Face Recognition in Public
       Places," University of California, Los Angeles, Los Angeles, CA January 28 2002.

                                Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                        Copyright  2002, American Society for Engineering Education
[42]   G. Barber, "Living on the Wrong Side of a One-Way Mirror: Face Recognition Technology and Video
       Surveillance," vol. 2002, 2001.

[43]   D. McGuire, "ACLU Warns of Face Recognition Pitfalls," vol. 2002: Newsbytes, 2001.

[44]   S. L. Olsen, R., "Can Face Recognition Keep Airports Safe," vol. 2002: ZDNet News, 2001.

[45]   Visionics, "Visionics FaceIt ARGUS Pilots Go Live At Dallas Fort-Worth and Palm Beach International
       Airports," vol. 2002: Visionics Inc, 2002.

[46]   R. Windman, "Your Face is Good Enough," vol. 2002: eWeek, 2001.

[47]   W. A. Barrett, "A Survey of Face Recognition Algorithms and Testing Results," Conference Record of the
       Thirty-First Asilomar Conference on Signals, Systems & Computers, vol. 1, pp. 301-305, 1997.

[48]   Eye Ticket, "Eye Pass," vol. 2001, 2001.

[49]   D. Sieberg, "Iris recognition at airports uses eye-catching technology," vol. 2001, 2000.

[50]   R. P. Wildes, "Iris Recognition Technology," Proceedings of IEEE, vol. 85, pp. 1348-1363, 1997.

[51]   R. P. Wildes, Asmuth, J. C., Green, G. L., Hsu, S. C., Kolczynski, R. J., Matey, J. R., McBride., S. E., "A
       System for Automated Iris Recognition," Proceedings of the Second IEEE Workshop on Applications of
       Computer Vision, pp. 121-128, 1994.

[52]   S. Weicheng, Kjanna, R, "Prolog to Iris Recognition: An Emerging Biometric Technology," Proceedings of
       IEEE, vol. 85, pp. 1347-1347, 1997.

[53]   G. O. Williams, "Iris Recognition Technology," IEEE Aerospace and Electronics Systems Magazine, vol.
       12, pp. 23-29, 1997.

[54]   R. Sanchez-Reillo, Sanchez-Avila, C., and Martin-Pereda, J. A., "Minimal Template Size for Iris-
       Recognition," Proceedings of the First Joint BMES/EMBS Conference, vol. 2, pp. 972, 1999.

[55]   J. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE
       Transactions on Pattern Analysis and Machine Intelligence, vol. 15, pp. 1148-1161, 1993.

[56]   R. Louks., “A Design and Testing Methodology for an Automotive Telematic User Interface,” Purdue
       University, West Lafayette, IN

[57]   666soon.com, "Benefits and Limitations of Biometrics," vol. 2002: 666soon.com, 2002.

[58]   M. Andress, "Biometrics at Work? Scanning the human body is starting to see limited enterprise use, but
       don't expect to give up a fingertip soon," vol. 2002: InfoWorld, 2001.

[59]   D. Birch, "A World Away From Reality: Biometrics is the Wrong Way to Track Terrorists," vol. 2002:
       Guardian, 2002.

[60]   T. Bracco, "Biometrics suites earn thumbs up," vol. 2002: Network World, 2000.

[61]   J. Evers, "Dutch Government uses Biometrics to ID immigrants," vol. 2002: CNN, 2001.

[62]   B. Forseca, "High-tech Biometrics May Offer The Solution To Authentication and Security Demands," vol.
       2002: InfoWorld, 2001.


                                Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                        Copyright  2002, American Society for Engineering Education
[63]   H. Harreld, "Biometrics points to greater security," vol. 2002: Federal Computer Week, 1999.

[64]   "Consumer Biometric Applications: A discussion paper," Information and Privacy Commissioner / Ontario,
       Toronto, Canada September 1999.

[65]   R. Clarke, "Interview on Privacy and Biometrics with Roger Clarke," vol. 2002: Biomet.org, 2000.

[66]   M. Cobb, "Privacy vs. Security," vol. 2002: E-Business Advisor Magazine, 2002.

[67]   B. Foran, "Privacy in the Electronic World Panel: Access and Privacy "Meeting the Challenges of Change:"
       Smartcards and Biometrics: The Privacy Implications," Privacy Commissioner of Canada, Toronto, Canada
       September 26 1996.

[68]   R. Norton, "IBIA Privacy Principles," vol. 2000: International Biometric Industry Association, 2000.

[69]   N. K. Ratha, Connell, J. H & Bolle, R. M, "Enhancing security and privacy in biometric based
       authentication systems," IBM Systems Journal, vol. 40, pp. 1-17, 2001.

[70]   G. Tomko, "Biometrics as a Privacy-Enhancing Technology: Friend of Foe or Privacy?," presented at
       Privacy Laws and Business 9th Privacy Commissioners' / Data Protection Authorities Workshop, Santiago
       de Compostela, Spain, 1998.

[71]   J. L. Wayman, Alyea, L., "Picking the Best Biometric for Your Application," in National Biometric Test
       Center Collected Works, vol. 1, J. L. Wayman, Ed. San Jose, CA: National Biometric Test Center, 2000,
       pp. 269 - 275.




                                Proceedings of the 2002 ASEE/SEFI/TUB Colloquium
                        Copyright  2002, American Society for Engineering Education

More Related Content

Viewers also liked (8)

(2011) Dynamic Signature Verifi cation and the Human Biometric Sensor Interac...
(2011) Dynamic Signature Verifi cation and the Human Biometric Sensor Interac...(2011) Dynamic Signature Verifi cation and the Human Biometric Sensor Interac...
(2011) Dynamic Signature Verifi cation and the Human Biometric Sensor Interac...
 
(2006) Dynamic Signature Forgery And Signature Strength
(2006) Dynamic Signature Forgery And Signature Strength(2006) Dynamic Signature Forgery And Signature Strength
(2006) Dynamic Signature Forgery And Signature Strength
 
(2008) Investigating The Relationship Between Fingerprint Image Quality And S...
(2008) Investigating The Relationship Between Fingerprint Image Quality And S...(2008) Investigating The Relationship Between Fingerprint Image Quality And S...
(2008) Investigating The Relationship Between Fingerprint Image Quality And S...
 
(2003) Facial Recognition at Purdue University Airport
(2003) Facial Recognition at Purdue University Airport(2003) Facial Recognition at Purdue University Airport
(2003) Facial Recognition at Purdue University Airport
 
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
 
(2006) An Evaluation of Retinal Imaging Technology for 4-H Beef and Sheep Ide...
(2006) An Evaluation of Retinal Imaging Technology for 4-H Beef and Sheep Ide...(2006) An Evaluation of Retinal Imaging Technology for 4-H Beef and Sheep Ide...
(2006) An Evaluation of Retinal Imaging Technology for 4-H Beef and Sheep Ide...
 
(2007) Defining Habituation Using Hand Geometry
(2007) Defining Habituation Using Hand Geometry(2007) Defining Habituation Using Hand Geometry
(2007) Defining Habituation Using Hand Geometry
 
(2013) Automatic Detection of Biometrics Transaction Times
(2013) Automatic Detection of Biometrics Transaction Times(2013) Automatic Detection of Biometrics Transaction Times
(2013) Automatic Detection of Biometrics Transaction Times
 

Similar to Graduate Course in Biometrics

Project Training Ppt
Project Training PptProject Training Ppt
Project Training Pptbiinoida
 
Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Dr. Amarjeet Singh
 
472008 1 BBiioommeettrriicc TTeecchhnnoollooggyy AApp.docx
472008 1  BBiioommeettrriicc  TTeecchhnnoollooggyy  AApp.docx472008 1  BBiioommeettrriicc  TTeecchhnnoollooggyy  AApp.docx
472008 1 BBiioommeettrriicc TTeecchhnnoollooggyy AApp.docxtroutmanboris
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfhsingh5201
 
Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0Elia Brodsky
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docThowfeekFayees
 
Codesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebCodesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebDavid Broadhurst
 
iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr
 
Pawlik
PawlikPawlik
Pawlikanesah
 
Pre production techniques
Pre production techniquesPre production techniques
Pre production techniquesJohnRobson15
 
DESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPDESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPIRJET Journal
 
iVisit-Research-Paper - for merge.pdf
iVisit-Research-Paper - for merge.pdfiVisit-Research-Paper - for merge.pdf
iVisit-Research-Paper - for merge.pdfShangHe
 
Bioinformatics Course at Indian Biosciences and Research Institute
Bioinformatics Course at Indian Biosciences and Research InstituteBioinformatics Course at Indian Biosciences and Research Institute
Bioinformatics Course at Indian Biosciences and Research Instituteajay vishwakrma
 

Similar to Graduate Course in Biometrics (20)

Project Training Ppt
Project Training PptProject Training Ppt
Project Training Ppt
 
Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...
 
472008 1 BBiioommeettrriicc TTeecchhnnoollooggyy AApp.docx
472008 1  BBiioommeettrriicc  TTeecchhnnoollooggyy  AApp.docx472008 1  BBiioommeettrriicc  TTeecchhnnoollooggyy  AApp.docx
472008 1 BBiioommeettrriicc TTeecchhnnoollooggyy AApp.docx
 
M.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdfM.Sc.Syllabus 17 Nov 2022 (1).pdf
M.Sc.Syllabus 17 Nov 2022 (1).pdf
 
Nba msr
Nba msrNba msr
Nba msr
 
Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Codesafe Voucher Report Final Feb
Codesafe Voucher Report Final FebCodesafe Voucher Report Final Feb
Codesafe Voucher Report Final Feb
 
Group project report
Group project reportGroup project report
Group project report
 
iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generation
 
Pawlik
PawlikPawlik
Pawlik
 
Dsp (1)
Dsp (1)Dsp (1)
Dsp (1)
 
Pre production techniques
Pre production techniquesPre production techniques
Pre production techniques
 
DESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APPDESIGN OF VIDEO CALLING APP
DESIGN OF VIDEO CALLING APP
 
Piovesan2016
Piovesan2016Piovesan2016
Piovesan2016
 
B_Hernandez Resume
B_Hernandez ResumeB_Hernandez Resume
B_Hernandez Resume
 
Attachment_0.pdf
Attachment_0.pdfAttachment_0.pdf
Attachment_0.pdf
 
CHAPTER ONE1 (Repaired)
CHAPTER ONE1 (Repaired)CHAPTER ONE1 (Repaired)
CHAPTER ONE1 (Repaired)
 
iVisit-Research-Paper - for merge.pdf
iVisit-Research-Paper - for merge.pdfiVisit-Research-Paper - for merge.pdf
iVisit-Research-Paper - for merge.pdf
 
Bioinformatics Course at Indian Biosciences and Research Institute
Bioinformatics Course at Indian Biosciences and Research InstituteBioinformatics Course at Indian Biosciences and Research Institute
Bioinformatics Course at Indian Biosciences and Research Institute
 

More from International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

More from International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Graduate Course in Biometrics

  • 1. Graduate Course Development in Biometrics Dr. Stephen J. Elliott, Dr. Mathias J. Sutton Department of Industrial Technology School of Technology West Lafayette, IN, 47906 Abstract This paper accounts the development of a graduate course in biometrics at Purdue University. The course has been developed in conjunction with the inauguration of an applied biometrics research laboratory. The laboratory represents a Purdue-industry partnership through sponsored projects, advisory relationships, and financial support, industry partners assure that the laboratory achieves its potential in preparing students to perform effectively in the quickly evolving biometrics environment. The laboratory also serves as an educational resource for industry. Introduction TECH 581S Biometric Technology and Applications, is a class intended for upper-level undergraduates in a number of disciplines, including aviation technology, industrial technology, computer information systems technology, and management, as well as graduate students in technology. The course is limited to 20 students per semester for two primary reasons: first to enable a small number of undergraduate students to interact with graduate students who perform a mentoring role in research. Secondly, the development of small research teams allows several projects to be completed and gives the students a tangible research experience to accompany the lectures that span the various biometric technologies. A number of factors have driven the demand for the course: an expansion of current classes, an increase in the awareness of biometric technologies in multiple applications, and the demand from students, especially post 9/11, to learn more about biometric technologies. The purpose of the course is to examine biometric technologies from the viewpoint of systems integrator, purchaser, and evaluator. Success of the biometrics system is important; therefore, this course examines the fundamentals of testing and evaluation, writing technical reports, presenting research, understanding the process of establishing biometrics standards, and understanding the individual technologies. The course is consistent with the mission of the School of Technology and the Department of Industrial Technology to “assess the existing curricula and programs; develop new curricula/programs to make them relevant to the life and careers of students, attractive in terms of content, and connected to the needs of business and industry.” Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 2. Prerequisite Courses TECH 581S has no prerequisites, as it is intended to attract students from a number of disciplines into the biometrics arena, as these technologies themselves enter different applied environments. However, a number of undergraduate students that are participating in the first run of the course have had prior experience in biometric technologies in IT 345 Automatic Identification and Data Capture. Course Description The course is a three-hour, three-credit course that meets once a week for 16 weeks with an independent lab research component. The research activities are a major component of the class. As such research activities make up 50% of the course grade. Upon successful completion of the course, each student will be able to: a) Classify biometric applications. b) Identify techniques for testing biometric devices. c) Apply “best practice” techniques for biometric project management and implementation. d) Understand which biometrics technology is best for a given application. e) Understand the ethics of biometric technologies. f) Understand the fundamentals of fingerprinting, iris scanning, speaker verification, hand geometry, dynamic signature recognition, facial recognition, and multi biometrics – voice, lip and facial recognition. e) Understand the limitations of biometric technologies. Semester activities are divided into nine different sessions (see Table 1), which follow the main lecture topics. A few of the sessions span more than one week. Table 1 Session Schedule for TECH 581S Session Lecture Topic 1 Course Introduction and Pre-Test 2 Biometrics - An Introduction 3 Biometric Testing and Evaluation 4 Dynamic Signature Verification 5 Hand Geometry 6 Fingerprint 7 Facial, Iris and Retinal Identification 8 Voice Recognition 9 Biometric Applications and Implementation Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 3. Research Activities The purpose of the research activities is to provide students with an applied research experience that they can use in their specific disciplines. Overall, there are 13 different research projects, which include fake finger testing, testing and evaluating fingerprint sensors on mobile computers, impostor knowledge within dynamic signature verification, and replication of a voice telematics experiment. However, most of the research activities are focused in two main areas: digital fingerprint and dynamic signature technology. The digital fingerprint thrust evolved based on discussions in the biometric community listserv on the “gummy finger” debate [1]. This debate provided course developers with a unique opportunity to create a cross-disciplinary project team comprised researchers from the Schools of Management, Computer Science, and Technology to examine the research and to expand the body of knowledge in this topic. Furthermore, attacks (such as fake fingers on biometric sensors) discussed in the literature, enable students to examine research protocols, replicate the tests, and report those findings within a constrained 16-week semester. The research will provide vendors and industry partners with feedback on the performance of their sensors, given the attacks described. Initially, research activities will center on two biometric technologies – fingerprint and dynamic signature verification. There has been little work published on fingerprint sensor attacks. According to Matsumoto, Matsumoto, Yamada, and Hoshino [1], "security evaluation against attacks using such artificial fingers has rarely been disclosed." The second research focus is a continuation of work already started in dynamic signature verification technology. Within the realm of dynamic signature verification, forgery is discussed at length [2-19], but with conflicting definitions of a forgery. Laboratory Equipment Equipment donations to the laboratory, software, and hardware upgrades have provided the opportunity to offer a course in biometric technologies. This equipment includes a number of fingerprint sensors that use both pattern and minutiae based algorithms; a desktop iris recognition camera; several dynamic signature verification digitizers, and a hand geometry reader. Session Outline As noted earlier, the course is divided into nine distinct sessions, designed to group a number of lectures together within a particular topic. Session One – Course Introduction The first session introduces and outlines the course. A 100-item pre-test assesses students’ current knowledge across biometric technologies and their perceptions of the technology. At the completion of each session, a post-test will evaluate their knowledge on each specific technology and provide both student and instructor with useful information on the success of the instruction, as well as gaps in student knowledge. The first session also includes an on-line evaluation Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 4. component, where each student completes the National Institute of Health human subject tutorial. Each student will participate as subjects in fellow students’ research and as such must understand the requirements of the Purdue University Human Subjects Review Board. Session Two – Introduction to Biometrics The second session outlines biometric technologies and introduces students to biometric technologies. Students will learn common research methodologies, the classification of biometric technologies [20] and the fundamentals of biometric technology [21]. Also included in this session is a discussion of testing protocols for dynamic signature verification [22]. Session Three – Biometric Testing and Evaluation Session 3 discusses biometrics from a historical perspective [23]. This session also includes readings and discussion on testing and evaluation, based on the UK Best Practice Testing Document and biometric applications and taxonomy [24-25]. A discussion on the testing methodologies relating to each group’s project will be started. Students will arrive with a draft of their testing protocol. This session will have approximately two hours of lecture and one hour of testing protocol evaluation. After session 3, all the groups should have finalized their testing protocol for the research experiments. As the UK Biometric Best Practice document is central to the research protocol development, students will be expected to have a comprehensive understanding of the manuscript; which will be evaluated using an online test. To help students understand the UK Biometric Best Practice Document, they will critique the testing methodology related to a case study [3]. In preparation for the next session, the students will read the National Biometric Test Center Collected Works, specifically those sections related to testing and evaluation [21, 26-28]. As with all testing, discussion on imposters (important to understand in the context of the research being conducted in the class) centers on allowing good imposters to test [29]. Session Four – Dynamic Signature Verification The fourth session continues to discuss the role of the readings related to biometrics testing and evaluation [30]. The course shifts in this session to focus on specific technologies and their role in industry. The first experiment involves dynamic signature verification as it relates to the feedback from the digitizer. The following research question is posed: is there a statistical difference in the individual variables across visible and non-visible feedback devices? Several devices will be studied, including those that have ink visible, against those devices that do not have ink visible (but both use a stylus), compared with a digitizer that uses pen and paper. A comparison of the underlying dynamic traits of the signature across all of these digitizers will be studied. Another dynamic signature verification study will examine the differences between gender and handedness across devices. Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 5. Session Five – Hand Geometry The lecture component of session five describes hand geometry and common applications such as immigration and access control systems. The research component of this session continues with a discussion on dynamic signature verification. The research focus in this session is to understand how the variables of the dynamic signature change when an impostor knows progressively more information about the genuine signature. A genuine signature is defined as a good faith attempt by a user to match his/her own stored template. An “imposter” transaction is a “zero-effort” attempt by a person unknown to the system to match a stored template. An imposter attempt is classed as “zero-effort” if the individual submits his/her own biometric feature as if attempting successful verification against his/her own template. The best practice document [30] acknowledges that with dynamic signature verification, an imposter would sign his/her own signature in a zero-effort attempt. Dynamic signature verification testing also poses additional problems, notwithstanding “zero-effort” attempts. Some dynamic signature verification studies use several methods to determine imposter distributions by forging a signature. Different levels of forgery exist, done by different individuals, with varying knowledge about the signature and under differing conditions, incentives, etc. Mettyear suggests that there are levels of information that the signer might have in order to make an attempt at a forgery. Session Six - Fingerprint Both the research and lecture components of this session deal with fingerprints and the concept of fingerprint identification. Several articles will be used to explain the concept of fingerprint identification. Aspects to be included in this session include fingerprint standards and methodologies and latent imaging [31-39]. The research focus of this session is to enroll users using the fingerprint devices selected for the studies on fake or artificial fingers. The second part of the fingerprint technology session will be to complete the research on fingerprinting and spoofing. Each semester the research objectives will change, depending on previous research, available grants, and resources. For the first run of the class, the fingerprint studies will examine spoofing the biometric device. There are several attacks that can be presented to a device [1]. These are using the registered finger under duress, using an impostor's finger (commonly called a zero- effort forgery), using a severed finger (liveness), a genetic clone of the finger, and using an artificial clone of the registered finger. The study will concentrate on the artificial clone of the registered finger. Several methodologies will be used to create an artificial clone of the registered finger, as established in prior research, as well as various accounts in the trade press[1,18-19]. Session Seven – Facial, Iris and Retinal Identification This session will describe the uses of facial recognition. Readings include discussions on facial recognition as they relate to applications [40--46]. There will also be a discussion on the facial recognition and testing [47], and the Facial Recognition Technology Test (FERET). Iris and retinal identification are also discussed in this session. As many enrolled students are in aviation technology, several of the application readings are from online discussions posted as a result of Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 6. September 11th, 2001 terrorist attacks [48-55]. Research components in this session relate to the continued evaluation of the fingerprint sensors as discussed earlier. Session Eight – Voice Recognition Although the majority of the course has centered on the identification of an individual, this session builds on a previous Masters degree directed project describing a telematics user interface [56]. A practical laboratory activity will be set up utilizing a limited command set for a touch sensitive entertainment system. The difference in time between voice and non-voice are measured. Session Nine - Biometric Applications and Implementations The final session outlines biometric technologies and some of the pitfalls and criticisms of biometrics with regard to the media. A debate will be initiated in response to criticisms of how the technologies are used, within the context of [75-81]. In this session, other readings will be discussed including biometrics and privacy [82-88]. Finally, a discussion on what biometric is suitable for a specific application will be revisited [89]. At the conclusion of this session, students will receive a post-test evaluating their performance over the semester. Conclusion This paper was written to provide information to the reader on the development of a biometrics course for upper-level undergraduate and graduate students. The paper outlined information on the readings that are used in the class as well as the research activities that are proposed for the students. Further papers will be written to provide educators with lessons learned in the developments of the course and its research. Bibliography [1] T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems," Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002. [2] H. Dullink, van Daalen, B., Nijhuis, J., Spaanenburg, L., & Zuidhof, H., "Implementing a DSP Kernel for Online Dynamic Handwritten Signature Verification Using the TMS320DSP Family," EFRIE, France SPRA304, 1996. [3] S. J. Elliott, "A Comparison of On-Line Dynamic Signature Trait Variables vis-à-vis Mobile Computing Devices and Table-Based Digitizers," presented at Automatic Identification Advanced Technologies (Auto ID 2002), New York, 2002. [4] F. D. Greiss, "On-Line Signature Verification." Michigan State University, East Lansing, MI May, 2000. [5] D. J. Hamilton, Whelan, J., McLaren, A., & MacIntyre, I., "Low Cost Dynamic Signature Verification System.," presented at European Convention on Security and Detention, London, United Kingdom, 1995. Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 7. [6] J. P. Holmes, "A Performance Evaluation of Biometric Identification Devices," Sandia National Laboratory SANDIA91-0276, 1991. [7] Y. Komiya, Matsumoto, T., "On-line Pen Input Signature Verification PPI (Pen-Position / Pen-Pressure / Pen-Inclination)," IEEE, 1999. [8] F. Leclerc, Plamondon, R., "Automatic Signature Verification: The State of the Art - 1989-1993," in Progress in Automatic Signature Verification. Singapore: World Scientific Publishing Company, 1994, pp. 3-21. [9] L. Lee, Berger, T., "Reliable Online Human Signature Verification System for Point-of-Sales Applications," Proceedings of the 12th IAPR International Conference on Computer Vision and Image Processing, Conference B, vol. 2, pp. 19-32, 1994. [10] X. Li, Parizeau, M., Plamondon, R, "Segmentation and Reconstruction of On-Line Handwritten Script.," IEEE Pattern Recognition, pp. 675-684, 1998. [11] R. Martens, Claesen, L, "On-Line Signature Verification: Discrimination Emphasized," IEEE, 1997. [12] M. Mingming, Wijesoma, W, "Automatic On-Line Signature Verification Based on Multiple Models," presented at CIFEr'01: Computational Intelligence in Financial Engineering Conference, 2000. [13] N. Mohankrishnan, Lee, W.S., Paulik, M., "Improved Segmentation through Dynamic Time Warping For Signature Verification using a Neural Network Classifier," presented at Signal Processing Society International Conference on Image Processing, 1998. [14] R. Plamondon, "The Design of an On-Line Signature Verification System: From Theory to Practice," in Progress in Automatic Signature Verification. New York: World Scientific Publishing Company, 1994. [15] C. Schmidt, & Kraiss, K. F, "Establishment of Personalized Templates for Automatic Signature Verification," IEEE, pp. 263-267, 1997. [16] Q. Z. Wu, Jou, I. C., & Lee, S. Y, "On-Line Signature Verification using LPC Cepstrum and Neural Networks," IEEE Transactions on Systems, Man, and Cybernetics, pp. 148-153, 1997. [17] Y. Yamazaki, Mizutani, Y., & Komatsu, N., "Extraction of Personal Features from Stroke Shape, Writing Pressure and Pen Inclination in Ordinary Characters.," presented at Fifth International Conference on Document Analysis and Recognition, 1998. [18] Tekey, "Trick an Optical Sensor," vol. 2002: Tekey Group, 2002. [19] T. van der Putte, Keuning, J, "Biometric Fingerprint Recognition: Don’t Get Your Fingers Burned," presented at IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, 2000. [20] P. Philips, Martin, A., Wilson, C., Przybocki, M., "An Introduction to Evaluating Biometric Systems," in IEEE Computer, 2000, pp. 56-63. [21] J. L. Wayman, "Fundamentals of Biometric Authentication Technologies," in National Biometric Test Center Collected Works, vol. 1, J. L. Wayman, Ed. San Jose, CA: National Biometric Test Center, 1999. [22] S. J. Elliott, "Development of a Biometric Testing Protocol for Dynamic Signature Verification," presented at ICARCV, 2002, Singapore, 2002. [23] J. Ashborne, Biometrics: Advanced Identity Verification. New York: Springer-Verlag, 2000. Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 8. [24] N. Mansfield, Wayman, J. L., "U.K. Biometric Working Group Best Practice Document," National Physical Laboratory, Teddington, England February 12 2002. [25] S. J. Elliott, "Addendum to the U. K. Biometric Best Practice Document," Purdue University, West Lafayette, IN August 10 2001. [26] J. L. Wayman, "The Functions of Biometric Identification Devices," vol. 2000. San Jose, CA: National Biometric Test Center, 2000. [27] J. L. Wayman, "Technical Testing and Evaluation of Biometric Identification Devices," in National Biometric Test Center Collected Works, vol. 1, J. L. Wayman, Ed. San Jose, CA: National Biometric Test Center, 2000, pp. 65-87. [28] J. L. Wayman, "Confidence Interval and Test Size Estimation for Biometric Data," presented at Automatic Identification Advanced Technologies (Auto ID 1999), Summit, NJ, 1999. [29] J. M. Colombi, Reider, J. S., Cambell, J. P., "Allowing Good Imposters to Test," Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers, vol. 1, pp. 296-300, 1997. [30] N. Mansfield, "A Review of Test Protocol for Scenario Evaluation of SMARTpen." Teddington, United Kingdom, 2000. [31] A. Jain, Bolle, R., & Pankanti, S., Biometrics: Personal Identification in Networked Society. Norwell, MA: Klewer Academic Publishers Group, 2001. [32] The Science of Fingerprints. Classifications and Uses, Rev 12-84 Ed: United States Department of Justice, Federal Bureau of Investigation, 1984. [33] A. Jain, Hong, L., & Bolle, R., "On-line Fingerprint Verification," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 302-314, 1997. [34] A. K. Jain, Prabhakaran, S., Hong, L., Pankanti, S., "Filterbank-based Fingerprint Matching," IEEE Transactions on Image Processing, vol. 9, pp. 846-859, 2000. [35] J. K. Schneider, Gojevic. S. M.,, "Ultrasonic Imaging Systems for Personal Identification," IEEE 2001 Ultrasonics Symposium, vol. 1, pp. 595-601, 2001. [36] M. Jiangto, Shaojun, W, "Automatic Fingerprint Identification System for Small Sized Database," Proc. 4th International Conference on ASIC, 2001, pp. 386-389, 2001. [37] D. Maio, Maltoni, D., Cappelli, R., Wayman, J. L., Jain, A. K, "FCV2000: Fingerprint Verification Competition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, pp. 402-412, 2002. [38] A. K. Jain, Ross, A., Prabhakaran, S, "Fingerprint Matching Using Minutiae and Texture Features," presented at Proc International Conference on Image Processing (ICIP), Greece, 2001. [39] U. Halici, Jain, L. C., Erol, A., "Introduction to Fingerprinting," in Intelligent Biometric Techniques in Fingerprint and Face Recognition, L. C. Jain, Halici, U. Hayashi, I., Lee, S. B., Tsutsui, S., Ed. Boca Raton, FL: CRC Press, 1999, pp. 1-35. [40] ACLU, "ACLU Opposes Use of Face Recognition Software in Airports Due To Ineffectiveness and Privacy Concerns," vol. 2002: ACLU. [41] P. E. Agre, "Your Face is not a Bar Code: Arguments against Automatic Face Recognition in Public Places," University of California, Los Angeles, Los Angeles, CA January 28 2002. Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 9. [42] G. Barber, "Living on the Wrong Side of a One-Way Mirror: Face Recognition Technology and Video Surveillance," vol. 2002, 2001. [43] D. McGuire, "ACLU Warns of Face Recognition Pitfalls," vol. 2002: Newsbytes, 2001. [44] S. L. Olsen, R., "Can Face Recognition Keep Airports Safe," vol. 2002: ZDNet News, 2001. [45] Visionics, "Visionics FaceIt ARGUS Pilots Go Live At Dallas Fort-Worth and Palm Beach International Airports," vol. 2002: Visionics Inc, 2002. [46] R. Windman, "Your Face is Good Enough," vol. 2002: eWeek, 2001. [47] W. A. Barrett, "A Survey of Face Recognition Algorithms and Testing Results," Conference Record of the Thirty-First Asilomar Conference on Signals, Systems & Computers, vol. 1, pp. 301-305, 1997. [48] Eye Ticket, "Eye Pass," vol. 2001, 2001. [49] D. Sieberg, "Iris recognition at airports uses eye-catching technology," vol. 2001, 2000. [50] R. P. Wildes, "Iris Recognition Technology," Proceedings of IEEE, vol. 85, pp. 1348-1363, 1997. [51] R. P. Wildes, Asmuth, J. C., Green, G. L., Hsu, S. C., Kolczynski, R. J., Matey, J. R., McBride., S. E., "A System for Automated Iris Recognition," Proceedings of the Second IEEE Workshop on Applications of Computer Vision, pp. 121-128, 1994. [52] S. Weicheng, Kjanna, R, "Prolog to Iris Recognition: An Emerging Biometric Technology," Proceedings of IEEE, vol. 85, pp. 1347-1347, 1997. [53] G. O. Williams, "Iris Recognition Technology," IEEE Aerospace and Electronics Systems Magazine, vol. 12, pp. 23-29, 1997. [54] R. Sanchez-Reillo, Sanchez-Avila, C., and Martin-Pereda, J. A., "Minimal Template Size for Iris- Recognition," Proceedings of the First Joint BMES/EMBS Conference, vol. 2, pp. 972, 1999. [55] J. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, pp. 1148-1161, 1993. [56] R. Louks., “A Design and Testing Methodology for an Automotive Telematic User Interface,” Purdue University, West Lafayette, IN [57] 666soon.com, "Benefits and Limitations of Biometrics," vol. 2002: 666soon.com, 2002. [58] M. Andress, "Biometrics at Work? Scanning the human body is starting to see limited enterprise use, but don't expect to give up a fingertip soon," vol. 2002: InfoWorld, 2001. [59] D. Birch, "A World Away From Reality: Biometrics is the Wrong Way to Track Terrorists," vol. 2002: Guardian, 2002. [60] T. Bracco, "Biometrics suites earn thumbs up," vol. 2002: Network World, 2000. [61] J. Evers, "Dutch Government uses Biometrics to ID immigrants," vol. 2002: CNN, 2001. [62] B. Forseca, "High-tech Biometrics May Offer The Solution To Authentication and Security Demands," vol. 2002: InfoWorld, 2001. Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education
  • 10. [63] H. Harreld, "Biometrics points to greater security," vol. 2002: Federal Computer Week, 1999. [64] "Consumer Biometric Applications: A discussion paper," Information and Privacy Commissioner / Ontario, Toronto, Canada September 1999. [65] R. Clarke, "Interview on Privacy and Biometrics with Roger Clarke," vol. 2002: Biomet.org, 2000. [66] M. Cobb, "Privacy vs. Security," vol. 2002: E-Business Advisor Magazine, 2002. [67] B. Foran, "Privacy in the Electronic World Panel: Access and Privacy "Meeting the Challenges of Change:" Smartcards and Biometrics: The Privacy Implications," Privacy Commissioner of Canada, Toronto, Canada September 26 1996. [68] R. Norton, "IBIA Privacy Principles," vol. 2000: International Biometric Industry Association, 2000. [69] N. K. Ratha, Connell, J. H & Bolle, R. M, "Enhancing security and privacy in biometric based authentication systems," IBM Systems Journal, vol. 40, pp. 1-17, 2001. [70] G. Tomko, "Biometrics as a Privacy-Enhancing Technology: Friend of Foe or Privacy?," presented at Privacy Laws and Business 9th Privacy Commissioners' / Data Protection Authorities Workshop, Santiago de Compostela, Spain, 1998. [71] J. L. Wayman, Alyea, L., "Picking the Best Biometric for Your Application," in National Biometric Test Center Collected Works, vol. 1, J. L. Wayman, Ed. San Jose, CA: National Biometric Test Center, 2000, pp. 269 - 275. Proceedings of the 2002 ASEE/SEFI/TUB Colloquium Copyright  2002, American Society for Engineering Education